Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 01:53 UTC

General

  • Target

    fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe

  • Size

    784KB

  • MD5

    fd91ff2522a05f96c8c0a0343dcf0620

  • SHA1

    285a69db395f92d02a677562bce2ac8444a8c971

  • SHA256

    29ee2ae78ff12ab3a3cfeded613ae90edf19a9ad5ab101cb7c133fd06a1294d6

  • SHA512

    509be6f4db4f2207a7a70096f2249061eb3d87210cd275e4539b80f9bc3ef870d71b37a2f66f8321f56a1cfca4b512c820a84a02c5e7e574ac4edfdb1b22a46c

  • SSDEEP

    24576:zjPRP1rxU3b856J7JdxIFgvVRkuNfMigAbpQIiqgEOgy/:PB19UwAdmevVRkuNfMi9xiZP

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of UnmapMainImage
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\fd91ff2522a05f96c8c0a0343dcf0620_JaffaCakes118.exe

    Filesize

    784KB

    MD5

    1c6d20132d7340338e8e5262a540c12e

    SHA1

    9783f51d1df4d02c7b2b3f5024b76b834820ba67

    SHA256

    d631d666aa4199892237d9450951a8b1cf0e1abf07d0560a8512185002cd9d81

    SHA512

    311bb2a19f602c2e2777ddf81c82201b27ada2b297e1b3031e360df0d31f8516bb045d01f79c5781cf1ae6002d8f8fcf100c0950bb857fb7af8444d02e90177e

  • memory/2616-16-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2616-17-0x00000000018B0000-0x0000000001974000-memory.dmp

    Filesize

    784KB

  • memory/2616-18-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2616-23-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/2616-29-0x00000000030A0000-0x0000000003233000-memory.dmp

    Filesize

    1.6MB

  • memory/2616-33-0x00000000005A0000-0x000000000071F000-memory.dmp

    Filesize

    1.5MB

  • memory/2616-34-0x0000000000400000-0x0000000000587000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-0-0x0000000000400000-0x0000000000712000-memory.dmp

    Filesize

    3.1MB

  • memory/2756-1-0x0000000000120000-0x00000000001E4000-memory.dmp

    Filesize

    784KB

  • memory/2756-2-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

  • memory/2756-14-0x0000000000400000-0x0000000000593000-memory.dmp

    Filesize

    1.6MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.